Vulnerabilities > Playsms > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-07-03 | CVE-2024-6469 | Injection vulnerability in Playsms 1.4.3 A vulnerability was found in playSMS 1.4.3. | 8.8 |
2021-09-10 | CVE-2021-40373 | Code Injection vulnerability in Playsms playSMS before 1.4.5 allows Arbitrary Code Execution by entering PHP code at the #tabs-information-page of core_main_config, and then executing that code via the index.php?app=main&inc=core_welcome URI. | 7.5 |
2020-02-05 | CVE-2020-8644 | Code Injection vulnerability in Playsms PlaySMS before 1.4.3 does not sanitize inputs from a malicious string. | 7.5 |
2017-05-21 | CVE-2017-9101 | Unrestricted Upload of File with Dangerous Type vulnerability in Playsms 1.4 import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file. | 7.5 |
2009-01-09 | CVE-2009-0103 | Code Injection vulnerability in Playsms 0.9.3 Multiple PHP remote file inclusion vulnerabilities in playSMS 0.9.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) apps_path[plug] parameter to plugin/gateway/gnokii/init.php, the (2) apps_path[themes] parameter to plugin/themes/default/init.php, and the (3) apps_path[libs] parameter to lib/function.php. | 7.5 |
2009-01-09 | CVE-2008-5881 | Path Traversal vulnerability in Playsms 0.9.3 Multiple directory traversal vulnerabilities in playSMS 0.9.3 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) gateway_module parameter to plugin/gateway/gnokii/init.php and the (2) themes_module parameter to plugin/themes/default/init.php. | 7.5 |
2004-12-31 | CVE-2004-2263 | SQL Injection vulnerability in Anton Raharja PlaySMS Valid Function SQL injection vulnerability in the valid function in fr_left.php in PlaySMS 0.7 and earlier allows remote attackers to modify SQL statements via the vc2 cookie. | 7.5 |